On-Demand Webinar
Protect Business Critical Operations
- Cloud
- Exposure Management
- Industrial Control Systems Monitoring
- IT/OT
- Tenable One
- Tenable OT Security
Protect business critical operations in IT/OT convergence by capturing complete visibility and interoperability gaps in your expanding threat surface
CISOs and security teams own “Enterprise-Wide Security Risk” but often have limited visibility into critical operations and assets.
If your enterprise relies on the Internet of Things (IoT) and/or operational technology (OT), there’s a good chance you are blind to the “invisible bridges” between your IT, OT, and IoT assets.
Effectively discover, measure, and minimize the risk posed by the invisible bridges in your environment.
Highlights
- Why CISOs need to understand the risk created by exponential growth in connected OT and IoT devices
- Closing visibility gaps and asset discovery challenges
- Differences between passive and active discovery, how they work, the benefits of each technique, and when to use them
- Use case - Smart meters and solar panels - Protecting the integrity of energy infrastructure with the rise of smart appliances, solar inverters, and smart meter
Who should watch?
CISOs, IT, OT/ICS operations and engineering leaders, and professionals responsible for ensuring the integrity, safety, and security of critical business systems and processes for any organization reliant on OT and IoT systems.
Speakers
Dave Reeves
Territory Manager, OT Security, Tenable
Dick Bussiere
Principal OT Security Engineer, Tenable